Unlock instant, AI-driven research and patent intelligence for your innovation.

Burglarproof method and system for portable computer devices

Inactive Publication Date: 2009-10-15
GIGA BYTE TECH CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Current portable computer devices (such as notebooks (NB), ultra mobile personal computers (UMPC), personal digital assistants (PDA), Internet accessible mobile phones, and the like) are not cheap and are often stolen, due in part to their smaller and lighter, size and weight.
When a portable computer device is stolen, possibility for retrieving the device is minimal, as thieves may reinstall the operating system or change hardware components, increasing identification difficulty.
Additionally, owners of stolen portable computer devices usually have not recourse in providing related device information to track down the device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Burglarproof method and system for portable computer devices
  • Burglarproof method and system for portable computer devices
  • Burglarproof method and system for portable computer devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017]Several exemplary embodiments of the invention are described with reference to FIGS. 1 through 5, which generally relate to a burglarproof method and system for portable computer devices. It is to be understood that the following disclosure provides various different embodiments as examples for implementing different features of the invention. Specific examples of components and arrangements are described in the following to simplify the present disclosure. These are, of course, merely examples and are not intended to be limiting. In addition, the present disclosure may repeat reference numerals and / or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various described embodiments and / or configurations.

[0018]The invention discloses a burglarproof method and system for portable computer devices.

[0019]An embodiment of the burglarproof method and system automatically provides use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A burglarproof method for portable computer devices is disclosed. When a portable computer device is activated, an IC thereof registers user data to a data server using an internal network device thereof and creates and uploads a hardware data table generated based on detection results by a BIOS to the data server. The hardware data table comprises an IP and a status field representing a use status of the portable computer device. When the status field represents “stolen”, the IC activates a stolen display function to lock a screen of the portable computer device to be incapable of performing any operations by users and performs a corresponding operation.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This Application claims priority of Taiwan Patent Application No. 97113611, filed on Apr. 15, 2008, the entirety of which is incorporated by reference herein.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The invention relates to portable computer devices, and more particularly to a burglarproof method and system for portable computer devices.[0004]2. Description of the Related Art[0005]Current portable computer devices (such as notebooks (NB), ultra mobile personal computers (UMPC), personal digital assistants (PDA), Internet accessible mobile phones, and the like) are not cheap and are often stolen, due in part to their smaller and lighter, size and weight. When a portable computer device is stolen, possibility for retrieving the device is minimal, as thieves may reinstall the operating system or change hardware components, increasing identification difficulty. Additionally, owners of stolen portable computer devices us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00
CPCG06F21/88
Inventor CHANG, AN-SHENGCHUANG, CHUNG-AN
Owner GIGA BYTE TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More